Sign Up to like & get
recommendations!
1
Published in 2019 at "Soft Computing"
DOI: 10.1007/s00500-018-3276-9
Abstract: Nowadays, water security is becoming increasingly prominent and the water security problem becomes a primary bottleneck restricting China’s future sustainable development. Water security in China is thus worth conducting an in-depth study. This paper aims…
read more here.
Keywords:
water security;
security evaluation;
water;
probabilistic linguistic ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "IEEE Access"
DOI: 10.1109/access.2021.3124565
Abstract: Modern vehicles are equipped with more than 100 Electrical Control Units (ECUs) with over 2500 signals to transmit internally. The application of advanced electronics and communication techniques helps a vehicle transform from an information island…
read more here.
Keywords:
vehicle;
electrical control;
security;
security evaluation ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "IEEE Transactions on Reliability"
DOI: 10.1109/tr.2020.3026570
Abstract: Intrusion tolerance is an ability to keep the correct service by masking the intrusion based on fault-tolerant techniques. With the rapid development of virtualization, the virtual machine (VM)-based intrusion tolerance scheme has been developed according…
read more here.
Keywords:
security evaluation;
security;
intrusion tolerant;
intrusion ... See more keywords